4.4.1.2. Deployment Steps

To ensure the proper functionality of the deployed use case, it is crucial to meticulously follow the steps outlined. Keep in mind that these steps may vary based on the specific requirements and needs of your case.

Below, you will find a breakdown of both mandatory and optional steps, with the understanding that their applicability depends on your unique circumstances.

Architecture

  • Architecture: This section outlines the nodes necessary for the functioning of the use case, providing essential information related to its architecture. You can find a detailed explanation of the deployment of each of the nodes in Deployment and basic configuration.

Administration

  • Define the UD Tag Policies: Through the use of UD Tag Policies, we can determine the compliance status of a device based on the tags that have been assigned to it. This will allow us to create custom tags for each level of compliance based on their characteristics.

Optional:
  • Define the UD Tag Application Requirements: With the use of the ON Agent, we can obtain information related to the applications and updates installed on the equipment. The UD Tag Application Requirements allow us to verify the compliance of a device based on the installed applications and the minimum version of these.

  • Define the Profiling: Improving the profiling process can be important for this use case since it can allow us to perform one compliance or another based on the type of device, as well as increase the information available to improve compliance rules.

Operation

  • Operation : In this step we will start operating the use case and checking that all the functionalities are working as expected. If we find some unexpected behavior we can go to the troubleshooting step in order to find and fix the issue.

Monitoring

  • Monitoring : See how the data is being ingested and saved in ON Analytics. To check this, open the different visualizations available for this use case.

Troubleshooting